Researchers Roel Verdult and Baris Ege, revealed that popular cars, including Ferrari and Porsche,which use Megamos Crypto transponders can be easily stolen. The level of interest on Car hacking is maximum following the recent hack of the Fiat Chrysler Jeep, news of the day is that a team or experts since 2012 is aware of the presence of security flaws […]
The hacking crew who breached the online adultery website Ashley Madison has leaked online a dump of the company’s websites containing user data. In July, the popular online cheating site Ashley Madison has been hacked and a big amount of data was stolen by hackers who posted part of this information online as proof of […]
A new report published by the popular investigator Brian Krebs show how cyber criminals have compromised chip-and-PIN technology. Recently chip-and-PIN technology started to be adopted in the US because it would improve the security for the customers, merchants and financial institutions. This is true, but the problem is that when the market pushes in one […]
The US National Security Agency has utilized an exceptional, decades-old association with AT&T to snoop on Internet utilization, as per recently uncovered reports spilled by Edward Snowden. The archives gave by the previous NSA foreman and checked on by The New York Times and ProPublica portrayed a “profoundly synergistic” telecom titan that showed a “great […]
CVE-2015-3842 is a new flaw affecting the Android mediaserver, which can be exploited to perform attacks involving arbitrary code execution. The problems for Android users continue, a long serie of vulnerabilities has been discovered by the experts in the last weeks, Stagefright, zero-day zero-day deserialization, and Certifi-Gate are the names of some of the flaw recently […]
Microsoft has pushed an emergency patch to remediate a zero-day vulnerability in Internet Explorer that is actively being exploited in-the-wild. Today, August 18th, 2015, Microsoft released an emergency patch after being notified of a critical vulnerability in all supported versions of Internet Explorer. All versions of Microsoft Internet Explorer from IE7 to IE11 are affected by this zero-day vulnerability. […]
A report revealed that Microsoft could scan PCs running Windows 10 searching for pirated games and unauthorized hardware and disable them. One thing is certain, for better or for worse, we are talking a lot about the new Microsoft operating system Windows 10. The experts mainly expressed privacy concerns around the Windows 10 OS, they […]
The Turkish security researchers Utku Sen has published the first open source ransomware for educational purposes that anyone can use. Ransomware is now open Source and available in GitHub. Ransomware is one of most dangerous cyber threats for end-users, in the recent months the number of ransomware in the wild is increased as never before. Criminal […]
The ICS-CERT has recently published six security advisories to warn organizations about a number of 0-day flaws in SCADA systems. The ICS-CERT has published six advisories to warn organizations about the presence of Zero-Day Flaws in SCADA Systems. Aditya K. Sood, security researcher at Elastica, has revealed in a talk at the Def Con 2015 conference several vulnerabilities […]
By Exploiting a flaw in the SS7 protocol hackers can access every conversation and text message mobile users send from everywhere in the world. Hackers can spy on every mobile phone user wherever it is. Channel Nine’s 60 Minutes has revealed the existence of a security hole in modern telecommunication systems that could be exploited by […]